Show simple item record

dc.contributor.authorMarete, John M.
dc.date.accessioned2020-08-29T14:17:26Z
dc.date.available2020-08-29T14:17:26Z
dc.date.issued2013-11-16
dc.identifier.urihttp://41.89.49.50/handle/123456789/144
dc.description.abstractIn today’s technology many institutions and business communities have embrace computer network connections to facilitate communication and sharing of available resources as means of exchanging electronic information locally and externally with other network. Wireless devices in a network are used to detect any intrusion and director types used for checking effect of attack (Carl, 2004). Network security devices/software like snort, firewall etc. are installed as the first step of securing networks after the implementation of any network. Snort IDS is a security tool and an intrusion detection system, capable of performing network real-time data traffic analysis and also data packet logs on IP networks (Caruso, 2007). Snort IDS software uses defined rules and policies to check each packet reaching to its network interface card in any connectionen_US
dc.language.isoenen_US
dc.titleFramework for examining intrusion detection in wireless networken_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record